Device Security Policies Reports

CW Nordics August 2019: Copenhagen woos tech startups
sponsored by TechTarget ComputerWeekly.com
EZINE: Copenhagen offers all the advantages startups need to get off the ground and many are setting up with the intention of staying there for the long haul. Also read how Nordic shipping giant Maersk is changing its approach to IT as nimble competitors strip complexity from the business of logistics.
Posted: 08 Feb 2021 | Published: 22 Aug 2019

TechTarget ComputerWeekly.com

CW Benelux February 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 08 Feb 2021 | Published: 01 Feb 2018

TechTarget ComputerWeekly.com

CW EMEA July 2023: Can we trust AI?
sponsored by TechTarget ComputerWeekly.com
EZINE: Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
Posted: 12 Jul 2023 | Published: 13 Jul 2023

TechTarget ComputerWeekly.com

Cyber Security: 2021 Worst in Show
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

TechTarget ComputerWeekly.com

CW Middle East - July-September 2022: UAE citizens embrace new digital technologies
sponsored by TechTarget ComputerWeekly.com
EZINE: A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.
Posted: 22 Jun 2022 | Published: 07 Jul 2022

TechTarget ComputerWeekly.com

Australia's cybersecurity game plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

TechTarget ComputerWeekly.com

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 08 Feb 2021 | Published: 23 Oct 2019

ServiceNow

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

How do you solve a problem like security training?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com